Osi Model : Application Layer

1703 Words4 Pages

OSI Model: In this class I had learnt about the which is interesting because which it plays a vital role in the IT all the web browsers , sending and receiving the information and opening a web page is basically by using the OSI MODEL in which it is made up of seven layers Application layer ,Presentation Layer ,session layer , Transport layer, Network Layer ,Data link Layer and physical layer From the application layer to the Network layer are implemented by the end users whereas the bottom three are implemented by all the nodes in the path. In application layer user interacts with the systems this layer provides protocols in which the applications communicate with each other means application layer is our browser or Gmail application if we are sending a mail. The Presentation layer is basically the operation system layer in which the application layer sends the information to the operation layer. The Session layer deals with the communication creating the session between the two communications which means this layer allows users of different machines to create a session between. Session layer can bind all these different streams belong to same application .Transport layer receives data from the session layer and divide into smaller units and these information are passes to the network layer on the receivers end it make sure these messages are accepted and arranged in the correct order .The network layer breaks message into packets and transmitted them across the network this layer take cares that the packets reach the correct destination. This is called as routing. Data link layer in which the switches operates and it breaks the packets into smaller units called frames these frames are passed to the physical layer for transmiss... ... middle of paper ... ...ng for work this is also one type of risk it is good until we handle when we cannot handle then there will be a risk but it is convenient so we are using. Coming to the threats I had come in-detail about denial of service, unauthorized access and many more. Coming to the part of firewalls which will be useful in our personal lives so that we can have an advantage of choosing the best one. We had come across types of firewalls and there advantages and which is best one. Coming to the secure devices we had learned about dial back systems, virtual private networks. Coming to the attacks I had learned about Trojan horses, software bugs, sniffers. There are many businesses depended on this network security like online banking, business processes etc. I had also got an idea on hacking and in what ways they hack. Everyone in the organization is responsible for the security.

Open Document